• Security

    All-Access Pass

    Good security requires good passwords. But good security is as much about ensuring access by authorised users as it is about preventing access by interlopers. Recovering, resetting, or removing passwords is sometimes a necessity. Here’s how.
    read more
  • Client

    Buying Laptops for Small Business

    The lowest price isn’t always the best value; paying a little extra for a notebook that’s designed for business could be a better deal.
    read more
ServerNetwork

Hosting Remote Applications over the Internet with Terminal Services

Giving small business users the applications they want, available everywhere? It’s actually easier than you think. With the release of Windows Server 2008, the venerable Terminal Services gains a host of new capabilities.

 

   
Client

Blackberry Apps Top Picks

1. If your clients rack up the airmiles then WorldMate Live is an ideal travel companion. It’ll help manage itineraries, keep track of exchange rates and weather and (if you’re using the premium version) even find alternative flights.

   
The Business

Do you get your cut from the cloud?

Cloud computing stands to be the most significant transformation for the IT industry in a generation. Analysts predict that within a few years, almost all companies will run at least some of their IT in the cloud; a minority will run all their computing that way.

   
ServerNetwork

Mining Logs with Splunk

There’s a lot of information floating around in a network, information that’s being written into log files every minute of every day. Those log files that contain everything you need to know about how the systems you’re managing are running, and how they’re responding to the demands of their users.

   
Security

Setting up false volumes in TrueCrypt

TrueCrypt is a free tool to create virtual encrypted disks housed within individual files, or a ‘volume within a volume’ – a hidden operating system and set of files that is invisibly housed in an encrypted file.

   
ServerNetworkBusiness Continuity

Storage: Buy, Build or Restore?

Over the last 20 years we have seen the cost of hardware and software plummet. For the most part, smaller companies can now run the same computing solutions as large companies.

   
The Business

Key Partner Programmes

Microsoft Partner Programme https://partner.microsoft.com/UK/

Signing up as a Microsoft partner gives you access to information, technical and pre-sales support, training (online and locally), certification courseware materials, analyst reports, sales and marketing tools

   
Telecoms

The latest Windows and Blackberry email handsets for business

Almost any phone does email, and there are dozens of Windows Mobile and BlackBerry models around. But if your clients want the latest high-end handsets, which of them are ready to do business?

   
Network

Dealing with spam in Exchange 2007

Spam isn’t just annoying - it’s a security risk and a prime source of malware and phishing attacks. The new version of Exchange has more effective tools to keep it at bay.

   
The Business

Contract Disputes

EDS-Sky dispute is a warning to all.

   

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

tools If you're trying to solve connectivity problems at a customer site, you can ask a colleague back at your office to use ping and traceroute to see how the network appears to the outside world; or you can use the tools at http://www.heise-online.co.uk/networks/nettools/ to do it yourself. There are tools for looking up Mac addresses and calculating subnet masks too. If you need a more detailed trace, http://w3dt.net/tools/pathping has a pathping tool.
read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS